Leeds, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
scalable, agnostic testing frameworks for use across agile delivery teams. Promote best practices including Test-Driven Development (TDD) , Behaviour-Driven Development (BDD) , and AI/ML-based testing for anomalydetection and performance validation. Mentor and upskill test and engineering teams in modern, automation-first testing approaches. Collaborate across teams to ensure quality and consistency throughout the More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Smart DCC
collaboratively with internal and external teams to identify opportunities for security improvements and review products that can advance our security capabilities, such as tools that support analysis/detection and other emerging technologies. Gather forensic data and physical equipment, to perform in-depth root cause analysis. Support use case tuning through auditing and approval, alongside developing new detection … security technologies, such as IDS, Web content filters, AV, SIEM, Vulnerability Management, Firewalls, and awareness of their purpose in a layered security approach alongside analysing their outputs for security anomaly detection. In-depth understanding of the cyber threat landscape, advanced adversary tactics, and the MITRE Attack Framework. Strong understanding of low-level concepts including operating systems, Active Directory, Windows More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Top Remote Talent
of-the-art NLP models, Transformers, Agentic Approaches for mixed (temporal and text) data analysis and summarization; Experience with pipeline orchestration tools like Airflow, Argo, etc.; Proven Experience with AnomalyDetection and Forecasting with explainability for temporal and mixed data; Intermediate+ English — ability to participate in written discussions with international teams and clients. Join a mission-driven More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
BAE Systems Applied Intelligence
improvements and delivering them Be a point of contact for intrusion analysis, forensics and Incident Response queries. Able to provide root cause analysis of non-standard analytic findings and anomaly detections for which a playbook does not yet exist. Responsible for ensuring that during times of reduced capacity that all ADHOC and regular products are completed and are at … used within the Cyber Threat Intelligence Domain, Including the Cyber Kill Chain and MITRE ATT&CK Development of new analytics and playbooks that result in creation of new detection rules/analytics Requirements Technical 3+ years’ experience in Cyber Threat Intelligence, and conducting research and investigating cyber threats in a technical capacity Experience in technical incident response and More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
Babcock
improvements and delivering them Be a point of contact for intrusion analysis, forensics and Incident Response queries. Able to provide root cause analysis of non-standard analytic findings and anomaly detections for which a playbook does not yet exist. Responsible for ensuring that during times of reduced capacity that all ADHOC and regular products are completed and are at … used within the Cyber Threat Intelligence Domain, Including the Cyber Kill Chain and MITRE ATT&CK Development of new analytics and playbooks that result in creation of new detection rules/analytics Requirements Technical 3+ years' experience in Cyber Threat Intelligence, and conducting research and investigating cyber threats in a technical capacity Experience in technical incident response and More ❯
Cramlington, England, United Kingdom Hybrid / WFH Options
Printed.com
we can shape the future world of print! Role Overview Join our evolving data team at The Printed Group. You'll build and deploy ML models for personalisation, recommendations, anomalydetection, and insights-all while following best practices in ML Ops and leveraging AI-powered tools to boost your productivity. Our Tech Stack Data Pipeline: Data sources … Databricks/Lambda → S3 (Delta format)/Embedded → Reporting/Notifications Infrastructure: AWS cloud managed via Terraform. Responsibilities Develop & Deploy ML Models: Build models that power personalisation, recommendations, and anomaly detection. Implement ML Ops: Set up continuous integration, monitoring, and automated retraining for production models. Leverage AI Tools: Use AI-powered coding assistants (e.g., Cursor, Copilot) to enhance development More ❯
other SOCs and cybersecurity researchers to identify analytics, threat intelligence, and tradecraft that benefit the Blue Team. Communicate funding and prioritization suggestions and lead implementation when needed. Develop complex, anomaly-based KQL analytics and playbooks for detection in M365, Linux, and Windows environments. Review open-source research on threats affecting cloud services and VMs, prioritizing and implementing … relevant findings. Research vulnerabilities, produce proof-of-concept exploits, and emulate adversary TTPs for training and detection evaluation. Review red team and pentest findings to improve detection rules. Provide forensic support and threat emulation to improve alert triage and accuracy. Identify gaps in SOC processes, data collection, and analysis, demonstrating the need for improvements through scenarios … AWS knowledge preferred. Understanding of Windows Active Directory and Windows OS fundamentals. Networking fundamentals experience. Experience with CI/CD and source control systems. Experience in developing malware and anomaly detections. Use of statistical methods for anomaly detection. Proficiency with Microsoft Sentinel and/or XDR. Strong skills in writing complex KQL analytics/searches. Awareness of current More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
University of Manchester
cyber-physical system security in various domains, including energy, transportation, finance, etc. The successful candidate should have the following research profile: Excellent knowledge of network security (e.g., intrusion and anomalydetection and prevention, denial-of-service attacks and countermeasures, wireless security, software-defined networks) and/or applied cryptography (e.g., algorithms and protocols, key management, real-world More ❯